|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_ocn847526898 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
130426s2013 nyu ob 001 0 eng |
010 |
|
|
|a 2020676289
|
040 |
|
|
|a DLC
|b eng
|e rda
|c DLC
|d YDXCP
|d E7B
|d EBLCP
|d AGLDB
|d OCLCF
|d VTS
|d AU@
|d STF
|d M8D
|d N$T
|d OCLCO
|d AJS
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781626183179
|q (epub)
|
020 |
|
|
|a 1626183171
|
020 |
|
|
|z 9781626183131
|q (hardcover)
|
020 |
|
|
|z 1626183139
|
029 |
1 |
|
|a AU@
|b 000056870098
|
029 |
1 |
|
|a DEBBG
|b BV043776350
|
029 |
1 |
|
|a NZ1
|b 15028109
|
029 |
1 |
|
|a DEBSZ
|b 450753085
|
035 |
|
|
|a (OCoLC)847526898
|
042 |
|
|
|a pcc
|
050 |
0 |
0 |
|a TA1637
|
072 |
|
7 |
|a COM
|x 083000
|2 bisacsh
|
082 |
0 |
0 |
|a 005.8/2
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Steganography and watermarking /
|c Ching-Nung Yang, Chia-Chen Lin, and Chin-Chen Chang, editors.
|
264 |
|
1 |
|a New York :
|b Nova Publishers,
|c [2013]
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
0 |
|
|a Privacy and identity protection
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
|
|
|a Description based on print version record and CIP data provided by publisher.
|
505 |
0 |
|
|a STEGANOGRAPHY AND WATERMARKING; STEGANOGRAPHY AND WATERMARKING; Library of Congress Cataloging-in-Publication Data; CONTENTS; PREFACE; Chapter 1: DATA HIDING FOR BINARY IMAGES; 1. INTRODUCTION; 2.WEIGHTED MATRIX METHOD; 4. PAIR-WISE METHOD; 5. HISTOGRAM-BASED SCHEME; 6. DATA HIDING BASED ON BINARY DOCUMENT; 7. COMPARISON; ACKNOWLEDGMENTS; REFERENCES; Chapter 2: REVERSIBLE DATA HIDING SCHEME FOR HALFTONE IMAGES; 1. INTRODUCTION; 2. RELATED WORKS; 3. LUT-BASED REVERSIBLE DATA HIDING SCHEME FOR HALFTONE IMAGES; 4. SIMULATION RESULTS; CONCLUSIONS; ACKNOWLEDGMENT; REFERENCES.
|
505 |
8 |
|
|a Chapter 3: REVERSIBLE DATA HIDING SCHEMES FOR JPEG IMAGES1. Introduction; 2. Overview of JPEG Standard; 3. LSB Based Reversible JPEG Watermarking; 4. Difference Expansion Based Reversible JPEG Watermarking; 5. Histogram Based Reversible JPEG Watermarking; 6. EOB Position Based Reversible JPEG Watermarking; 7. Equivalence Based JPEG Watermarking; 8. Authentication Application; References; Chapter 4: LOSSLESS DATA HIDING BASED ON VQ; ABSTRACT; INTRODUCTION; RELATED WORKS; 3. THE PROPOSED SCHEME; 4. EXPERIMENTAL RESULTS; CONCLUSION; REFERENCES.
|
505 |
8 |
|
|a Chapter 5: A HIGH QUALITY STEGANOGRAPHIC SCHEME WITH PIXEL-VALUE DIFFERENCING1. INTRODUCTION; 2. PREVIOUS WORKS; 3. THE PROPOSED STEGANOGRAPHY SCHEME; 4. EXPERIMENT AND COMPARISON; CONCLUSION; REFERENCES; APPENDIX; Chapter 6: REVERSIBLE DATA HIDING BASED ON HISTOGRAM TECHNIQUE; ABSTRACT; 1. INTRODUCTION; 2. RDH USING HISTOGRAM-SHIFTING; 3. RDH BY ADJUSTING THE AUXILIARY INFORMATION; 4. HIGH-CAPACITY RDH BASED ON HISTOGRAM MODIFICATION; 5. HISTOGRAM-BASED RDH WITH MINOR DISTORTION; CONCLUSION; ACKNOWLEDGMENTS; REFERENCES; Chapter 7: STEGANOGRAPHY IN SCRIPT FILES; 7.1. INTRODUCTION.
|
505 |
8 |
|
|a 7.2. STEGANOGRAPHY SCHEMES USING SCRIPT FILES7.3. HYBRID STEGANOGRAPHIC FRAMEWORK; 7.4. EXPERIMENTAL RESULTS AND ANALYSIS; CONCLUSIONS; REFERENCES; Chapter 8: THE STATE-OF-THE-ART STEGANOGRAPHY FOR 3D MESHES; 1. INTRODUCTION; 2. DISTORTION STEGANOGRAPHY; 3. REPRESENTATION STEGANOGRAPHY; 4. PERMUTATION STEGANOGRAPHY; CONCLUSION; REFERENCES; Chapter 9: STEGANALYSIS ALGORITHM FOR DETECTING THE HIDDEN INFORMATION IN IMAGES; 1. INTRODUCTION; 2. RELATED WORKS; 3. PROPOSED SCHEME; 4. EXPERIMENT RESULT; CONCLUSION; REFERENCES; Chapter 10: SVD-BASED DIGITAL IMAGE WATERMARKING; 1. INTRODUCTION.
|
505 |
8 |
|
|a 2. IMAGE FEATURES EXTRACTION AND SVD TRANSFORMATION3. GENERAL METHOD OF SVD-BASED DIGITAL WATERMARKING; 4. COMPARISON BETWEEN SVD-BASED AND DWT-BASED WATERMARKING; CONCLUSIONS; ACKNOWLEDGMENTS; REFERENCES; Chapter 11: ROBUST SVD-DCT DOMAIN IMAGE WATERMARKING; 11.1. INTRODUCTION; 11.2. SVD-BASED ROBUST WATERMARKING; 11.3. SVD-DCT HYBRID DOMAIN WATERMARKING SCHEMES; 11.4. EXPERIMENTAL RESULTS; 11.5. DISCUSSION; REFERENCES; Chapter 12: FRAGILE WATERMARKING FOR CONTENT AUTHENTICATION WITH TAMPER LOCALIZATION; 1. INTRODUCTION; 2. OVERVIEW OF DIGITAL HALFTONING AND INVERSE HALFTONING.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Image processing
|x Security measures.
|
650 |
|
0 |
|a Image files
|x Security measures.
|
650 |
|
0 |
|a Digital watermarking.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
6 |
|a Traitement d'images
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Fichiers d'images
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Tatouage numérique.
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
7 |
|a digital watermarking.
|2 aat
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Cryptography.
|2 bisacsh
|
650 |
|
7 |
|a Cryptography
|2 fast
|
650 |
|
7 |
|a Digital watermarking
|2 fast
|
700 |
1 |
|
|a Yang, Ching-Nung,
|e editor.
|
700 |
1 |
|
|a Lin, Chia-Chen,
|e editor.
|
700 |
1 |
|
|a Chang, Chin-Chen,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|t Steganography and watermarking
|d New York : Nova Publishers, [2013]
|z 9781626183131 (hardcover)
|w (DLC) 2013007522
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=591935
|z Texto completo
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10752330
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 591935
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10719468
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL3022470
|
994 |
|
|
|a 92
|b IZTAP
|